Paper
27 January 2010 Robust minutiae hash for fingerprint template protection
Bian Yang, Christoph Busch, Patrick Bours, Davrondzhon Gafurov
Author Affiliations +
Proceedings Volume 7541, Media Forensics and Security II; 75410R (2010) https://doi.org/10.1117/12.838998
Event: IS&T/SPIE Electronic Imaging, 2010, San Jose, California, United States
Abstract
A robust fingerprint minutiae hash generation algorithm is proposed in this paper to extract a binary secure hash bit string from each fingerprint minutia and its vicinity. First, ordering of minutiae points and rotation and translation geometric alignment of each minutiae vicinity are achieved; second, the ordered and aligned points are diversified by offsetting their coordinates and angles in a random way; and finally, an ordered binary minutia hash bit string is extracted by quantizing the coordinates and angle values of the points in the diversified minutiae vicinity. The generated hashes from all minutiae vicinities in the original template form a protected template, which can be used to represent the original minutia template for identity verification. Experiments show desirable comparison performance (average Equal Error Rate 0.0233 using the first two samples of each finger in FVC2002DB2_A) by the proposed algorithm. The proposed biometric reference requires less template storage capacity compared to their unprotected counterparts. A security analysis is also given for the proposed algorithm.
© (2010) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Bian Yang, Christoph Busch, Patrick Bours, and Davrondzhon Gafurov "Robust minutiae hash for fingerprint template protection", Proc. SPIE 7541, Media Forensics and Security II, 75410R (27 January 2010); https://doi.org/10.1117/12.838998
Lens.org Logo
CITATIONS
Cited by 28 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Biometrics

Binary data

Information security

Databases

Detection and tracking algorithms

Quantization

Error analysis

Back to Top